메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술대회자료
저자정보
Chang-Hong Kim (Soongsil Univ) Sangphil Kim (Soongsil University) Jong-Bae Kim (Soongsil University)
저널정보
한국정보통신학회 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION & COMMUNICATION ENGINEERING 2015 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION & COMMUNICATION ENGINEERING Vo.7 No.1
발행연도
2015.6
수록면
415 - 418 (4page)

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
Recently, cyber-attack like APT (Advanced Persistent Threat) has been increased as IT technology develops. The trend of spear-phishing, which takes more than 90% of APT attack, has been changed from the previous way of attack aiming unspecified mass to target specified individuals. It is impossible to defend instantly due to spear-phishing uses complex of diverse techniques of attack. Especially, it is difficult to detect and cure with current virus vaccine if it is an attack using unknown techniques. So the scale of damage may increase. It is not easy for Individuals, who are relatively weak in security management, to avoid social technological attack compare with companies and institutions where relatively have countermeasure. The suggested model synthetically uses data encoding, blocking control application, and blocking network access to protect system, and based on the white list, works on the application control, checking validity of digital signature, protecting registry, and detecting & controlling reverse-access functions.

목차

Abstract
I. INTRODUCTION
II. RELATED STUDIES
III. PRESENT CONDITION OF SPEAR-PHISHING
IV. THE RESPOND SYSTEM MODEL OF SPEAR-PHISHING
V. CONCLUSION
REFERENCES

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문의 저자 정보

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-ECN-0101-2018-004-000971638